Home | Amazing | Today | Tags | Publishers | Years | Search 
JavaScript: The Missing Manual
JavaScript: The Missing Manual

Not too long ago, the Web was a pretty boring place. Constructed from plain old HTML, Web pages displayed information and not much else. Folks would click a link and then wait for a new Web page to load—and that was about as interactive as it got.

These days, most Web sites are almost as responsive as the...

Asterisk: The Definitive Guide (Definitive Guides)
Asterisk: The Definitive Guide (Definitive Guides)

This is a book for anyone who uses Asterisk.

Asterisk is an open source, converged telephony platform, which is designed primarily to run on Linux. Asterisk combines more than 100 years of telephony knowledge into a robust suite of tightly integrated telecommunications applications. The power of Asterisk lies in its...

Model-based Visual Tracking: The OpenTL Framework
Model-based Visual Tracking: The OpenTL Framework

Object tracking is a broad and important fi eld in computer science, addressing the most different applications in the educational, entertainment, industrial, and manufacturing areas. Since the early days of computer vision, the state of the art of visual object tracking has evolved greatly, along with the available imaging devices...

Numerical Methods, Algorithms and Tools in C#
Numerical Methods, Algorithms and Tools in C#

Today, more than at any other time in the history of mankind, computers are increasingly and successfully being exploited to gain a better understanding of our physical world and as a result, also deepen our appreciation and reverence for God’s Creation. Consequently, as computers evolve, so must the means to control them through...

Developer's Guide to Microsoft Prism 4
Developer's Guide to Microsoft Prism 4

Building WPF and Silverlight applications can be challenging, especially for those new to the technology. Building clean, maintainable, extensible, testable, loosely coupled ones— with no idea where to start—is close to impossible. In late 2007, I was privileged to get a call from Glenn Block at Microsoft asking if I was...

Enhancing Architectural Drawings and Models with Photoshop
Enhancing Architectural Drawings and Models with Photoshop

The first two chapters of this book are related and should be read in sequence. Chapter 1 is about preparing computer-aided design (CAD) and/or building information models (BIM) for enhancement, and Chapter 2 teaches you how to add the enhancements (such as color, pattern, shadow, and lineweight) in Photoshop.

All of the other 10...

SharePoint 2010 Development For Dummies
SharePoint 2010 Development For Dummies

In the last few years SharePoint has taken the world by storm. In fact, the product is one of the fastest growing products in the history of Microsoft. Companies of all sizes are rapidly implementing SharePoint and moving it to the center of their organization. The interesting thing about SharePoint, however, is that if you ask ten...

Core Concepts in Data Analysis: Summarization, Correlation and Visualization
Core Concepts in Data Analysis: Summarization, Correlation and Visualization

In this textbook, I take an unconventional approach to data analysis. Its contents are heavily influenced by the idea that data analysis should help in enhancing and augmenting knowledge of the domain as represented by the concepts and statements of relation between them. According to this view, two main pathways for data analysis are...

Lectures in Game Theory for Computer Scientists
Lectures in Game Theory for Computer Scientists

Game playing is a powerful metaphor that fits many situations where interaction between autonomous agents plays a central role. Numerous tasks in computer science, such as design, synthesis, verification, testing, query evaluation, planning, etc. can be formulated in game-theoretic terms. Viewing them abstractly as games reveals the...

Search Engine Optimization (SEO): An Hour a Day
Search Engine Optimization (SEO): An Hour a Day

How is your website doing on the search engines? Need a little help? Well, you’re holding the right book in your hands. This book will walk you through the steps to achieve a targeted, compelling presence on the major search engines. There are no secrets or tricks here, just downto- earth, real-world advice and a clear program...

Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms
Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms

Randomization has become a standard approach in algorithm design. Efficiency and simplicity are the main features of randomized algorithms that often made randomization a miraculous springboard for solving complex problems in various applications. Especially in the areas of communication, cryptography, data management, and discrete...

Result Page: 381 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 365 364 363 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy